Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2022 14:46

General

  • Target

    b270ce779ab0039ad0cb3f635ebf56589d71ba7e02f0238ec05777c37e1e358d.exe

  • Size

    213KB

  • MD5

    e4b8e1635d88b7a450d1514b6324b907

  • SHA1

    c2d351c6f805fd435bd1de5df0b4b4fd112d1678

  • SHA256

    b270ce779ab0039ad0cb3f635ebf56589d71ba7e02f0238ec05777c37e1e358d

  • SHA512

    ffcd9feb3c6bf62b993a714fbd54d9562f34678e8e79f4fd45f69b334a086e710cdc04e42169aaf8eec60d9b9391fcf1aae3db88585ce64549a0df7071c6d7f2

  • SSDEEP

    3072:mRDXp0nzyLyFFMugJ0MlRl5odAoDotleqHGQSRto0KNUguzWBC:e7/LyFbM/65kGLvo0gUguzWBC

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b270ce779ab0039ad0cb3f635ebf56589d71ba7e02f0238ec05777c37e1e358d.exe
    "C:\Users\Admin\AppData\Local\Temp\b270ce779ab0039ad0cb3f635ebf56589d71ba7e02f0238ec05777c37e1e358d.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:840
  • C:\Users\Admin\AppData\Local\Temp\DF1A.exe
    C:\Users\Admin\AppData\Local\Temp\DF1A.exe
    1⤵
    • Executes dropped EXE
    PID:1080
  • C:\Users\Admin\AppData\Local\Temp\E17C.exe
    C:\Users\Admin\AppData\Local\Temp\E17C.exe
    1⤵
    • Executes dropped EXE
    PID:4216
  • C:\Users\Admin\AppData\Local\Temp\ED83.exe
    C:\Users\Admin\AppData\Local\Temp\ED83.exe
    1⤵
    • Executes dropped EXE
    PID:4212
  • C:\Users\Admin\AppData\Local\Temp\F6FA.exe
    C:\Users\Admin\AppData\Local\Temp\F6FA.exe
    1⤵
    • Executes dropped EXE
    PID:3872
  • C:\Users\Admin\AppData\Local\Temp\FDD1.exe
    C:\Users\Admin\AppData\Local\Temp\FDD1.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2712
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 1264
      2⤵
      • Program crash
      PID:1832
  • C:\Users\Admin\AppData\Local\Temp\1969.exe
    C:\Users\Admin\AppData\Local\Temp\1969.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Windows\system32\cmd.exe
      cmd.exe /c "del C:\Users\Admin\AppData\Local\Temp\1969.exe"
      2⤵
        PID:4368
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
        PID:3876
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:2684
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:2672
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:3160
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2712 -ip 2712
              1⤵
                PID:4188
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:2916
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:3784
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:4928
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:3956
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:2024

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\1969.exe

                          Filesize

                          7.5MB

                          MD5

                          ee50fb38cb90b613a8c063626d3df2ca

                          SHA1

                          f7d42c03a71d17cdfb93f820dd2147be009fa01e

                          SHA256

                          db098d7fd521ad0112db04626fa4785005a4920521fa31a1e7c8afaf6bed841c

                          SHA512

                          10e17199b14a40fcdb3a3fe2e5601fc5378c5f85019549911efd3b7679e067edf179c3798d852eda611171a9384845cddeb4df2c6ec395b7ea24555a39bb43d9

                        • C:\Users\Admin\AppData\Local\Temp\1969.exe

                          Filesize

                          7.5MB

                          MD5

                          ee50fb38cb90b613a8c063626d3df2ca

                          SHA1

                          f7d42c03a71d17cdfb93f820dd2147be009fa01e

                          SHA256

                          db098d7fd521ad0112db04626fa4785005a4920521fa31a1e7c8afaf6bed841c

                          SHA512

                          10e17199b14a40fcdb3a3fe2e5601fc5378c5f85019549911efd3b7679e067edf179c3798d852eda611171a9384845cddeb4df2c6ec395b7ea24555a39bb43d9

                        • C:\Users\Admin\AppData\Local\Temp\DF1A.exe

                          Filesize

                          419KB

                          MD5

                          93773c9cab9b15bd9238aebfe36712bf

                          SHA1

                          5d8878372c87b08a64298db91c884645ccf28443

                          SHA256

                          b88c64f57a70f95f35fbe30ab3614608f34a2b9a6121c055d5da0358e24b6890

                          SHA512

                          78d6ba07ae1e3cad90cc199f41f7d71fd2b69f2d844e7a0a6579509d48634b486165df657cb837eba3dc650612c3c71f4b1f808139d8dc85988a848381c70d87

                        • C:\Users\Admin\AppData\Local\Temp\DF1A.exe

                          Filesize

                          419KB

                          MD5

                          93773c9cab9b15bd9238aebfe36712bf

                          SHA1

                          5d8878372c87b08a64298db91c884645ccf28443

                          SHA256

                          b88c64f57a70f95f35fbe30ab3614608f34a2b9a6121c055d5da0358e24b6890

                          SHA512

                          78d6ba07ae1e3cad90cc199f41f7d71fd2b69f2d844e7a0a6579509d48634b486165df657cb837eba3dc650612c3c71f4b1f808139d8dc85988a848381c70d87

                        • C:\Users\Admin\AppData\Local\Temp\E17C.exe

                          Filesize

                          356KB

                          MD5

                          70682f6421f864560af22030f9592d6e

                          SHA1

                          873c3d4e7237813b74d20f6f598d422c08e536ab

                          SHA256

                          acb8a59668d365181ce19a1fdd19aa992d86a9797f148e408daf5c7e9fa62bd3

                          SHA512

                          27a576447278c55fdee54cdd3e38098774bcabba6f007d494966104572951f11b3984f314cdb1a833e8a69280d1a500a089ba5660f0f4a3a32fef575aba0c5a5

                        • C:\Users\Admin\AppData\Local\Temp\E17C.exe

                          Filesize

                          356KB

                          MD5

                          70682f6421f864560af22030f9592d6e

                          SHA1

                          873c3d4e7237813b74d20f6f598d422c08e536ab

                          SHA256

                          acb8a59668d365181ce19a1fdd19aa992d86a9797f148e408daf5c7e9fa62bd3

                          SHA512

                          27a576447278c55fdee54cdd3e38098774bcabba6f007d494966104572951f11b3984f314cdb1a833e8a69280d1a500a089ba5660f0f4a3a32fef575aba0c5a5

                        • C:\Users\Admin\AppData\Local\Temp\ED83.exe

                          Filesize

                          356KB

                          MD5

                          34c6dc517df5134a240359e7e5bcaa1a

                          SHA1

                          5b933fa9f7634bc9813d5332b0e65e3276ef7148

                          SHA256

                          d1a868c3491d26107fb5f7019b54b1ebd467294091c9675198e2fcf805a3c28e

                          SHA512

                          101e18032ef5634bba987e9d33b2cc1c5f91db0db2beada259dde3367ee363924471f71a4a4cf985255b41995761927910bea0a8a0e790ef978bfbcfe8d7e7fa

                        • C:\Users\Admin\AppData\Local\Temp\ED83.exe

                          Filesize

                          356KB

                          MD5

                          34c6dc517df5134a240359e7e5bcaa1a

                          SHA1

                          5b933fa9f7634bc9813d5332b0e65e3276ef7148

                          SHA256

                          d1a868c3491d26107fb5f7019b54b1ebd467294091c9675198e2fcf805a3c28e

                          SHA512

                          101e18032ef5634bba987e9d33b2cc1c5f91db0db2beada259dde3367ee363924471f71a4a4cf985255b41995761927910bea0a8a0e790ef978bfbcfe8d7e7fa

                        • C:\Users\Admin\AppData\Local\Temp\F6FA.exe

                          Filesize

                          720KB

                          MD5

                          6a4b0bf0bd9f496ee1398e702dcb25e1

                          SHA1

                          bb020b724fc67dc818ae7a2f354fb268ed42f706

                          SHA256

                          0103856c001d654207c4496b55b06921f5ed3818450a624464c5062b7668abb5

                          SHA512

                          c09b4adf6f8fbb3718ec18aefba052e52179594ecfc6b08daede38815c03fa8ed3ca3b8de0fb4ec9acafb10f40ae835ba7f364e1c5876ae18aaf6291b444f4e2

                        • C:\Users\Admin\AppData\Local\Temp\F6FA.exe

                          Filesize

                          720KB

                          MD5

                          6a4b0bf0bd9f496ee1398e702dcb25e1

                          SHA1

                          bb020b724fc67dc818ae7a2f354fb268ed42f706

                          SHA256

                          0103856c001d654207c4496b55b06921f5ed3818450a624464c5062b7668abb5

                          SHA512

                          c09b4adf6f8fbb3718ec18aefba052e52179594ecfc6b08daede38815c03fa8ed3ca3b8de0fb4ec9acafb10f40ae835ba7f364e1c5876ae18aaf6291b444f4e2

                        • C:\Users\Admin\AppData\Local\Temp\FDD1.exe

                          Filesize

                          447KB

                          MD5

                          89352e8c08c9fd0f48a76822f3f5a3b3

                          SHA1

                          3b1421963698640a76fb0677694f65afe1c75bc1

                          SHA256

                          4b7f5a3df8170c4ea12a0ff058abb3cab8978063f551f32174ec63fa0d39071d

                          SHA512

                          60c111082b26bdd38a401b3b283f63044312d73b14acc95dca474f9eeeca7bac9179d2ddff9f4172d1c5669ca2c8148c3b144bfebf9b8505aa7aeadbb1586db3

                        • C:\Users\Admin\AppData\Local\Temp\FDD1.exe

                          Filesize

                          447KB

                          MD5

                          89352e8c08c9fd0f48a76822f3f5a3b3

                          SHA1

                          3b1421963698640a76fb0677694f65afe1c75bc1

                          SHA256

                          4b7f5a3df8170c4ea12a0ff058abb3cab8978063f551f32174ec63fa0d39071d

                          SHA512

                          60c111082b26bdd38a401b3b283f63044312d73b14acc95dca474f9eeeca7bac9179d2ddff9f4172d1c5669ca2c8148c3b144bfebf9b8505aa7aeadbb1586db3

                        • memory/840-135-0x0000000000400000-0x000000000043A000-memory.dmp

                          Filesize

                          232KB

                        • memory/840-133-0x0000000000590000-0x0000000000599000-memory.dmp

                          Filesize

                          36KB

                        • memory/840-132-0x00000000005BE000-0x00000000005CE000-memory.dmp

                          Filesize

                          64KB

                        • memory/840-134-0x0000000000400000-0x000000000043A000-memory.dmp

                          Filesize

                          232KB

                        • memory/2024-207-0x00000000007A0000-0x00000000007A8000-memory.dmp

                          Filesize

                          32KB

                        • memory/2024-198-0x0000000000790000-0x000000000079B000-memory.dmp

                          Filesize

                          44KB

                        • memory/2024-197-0x00000000007A0000-0x00000000007A8000-memory.dmp

                          Filesize

                          32KB

                        • memory/2672-176-0x00000000009E0000-0x00000000009E9000-memory.dmp

                          Filesize

                          36KB

                        • memory/2672-201-0x00000000009F0000-0x00000000009F5000-memory.dmp

                          Filesize

                          20KB

                        • memory/2672-179-0x00000000009F0000-0x00000000009F5000-memory.dmp

                          Filesize

                          20KB

                        • memory/2684-174-0x0000000000820000-0x000000000082F000-memory.dmp

                          Filesize

                          60KB

                        • memory/2684-200-0x0000000000830000-0x0000000000839000-memory.dmp

                          Filesize

                          36KB

                        • memory/2684-171-0x0000000000830000-0x0000000000839000-memory.dmp

                          Filesize

                          36KB

                        • memory/2712-155-0x00000000051A0000-0x00000000057B8000-memory.dmp

                          Filesize

                          6.1MB

                        • memory/2712-151-0x000000000051E000-0x0000000000555000-memory.dmp

                          Filesize

                          220KB

                        • memory/2712-157-0x0000000005880000-0x000000000598A000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/2712-156-0x0000000005860000-0x0000000005872000-memory.dmp

                          Filesize

                          72KB

                        • memory/2712-159-0x0000000005CA0000-0x0000000005D32000-memory.dmp

                          Filesize

                          584KB

                        • memory/2712-162-0x0000000006860000-0x0000000006D8C000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/2712-161-0x0000000006690000-0x0000000006852000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/2712-154-0x0000000004B40000-0x00000000050E4000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/2712-153-0x0000000000400000-0x0000000000475000-memory.dmp

                          Filesize

                          468KB

                        • memory/2712-173-0x0000000006FE0000-0x0000000007030000-memory.dmp

                          Filesize

                          320KB

                        • memory/2712-152-0x0000000000920000-0x0000000000979000-memory.dmp

                          Filesize

                          356KB

                        • memory/2712-160-0x0000000005D40000-0x0000000005DA6000-memory.dmp

                          Filesize

                          408KB

                        • memory/2712-175-0x0000000007050000-0x00000000070C6000-memory.dmp

                          Filesize

                          472KB

                        • memory/2712-158-0x0000000005990000-0x00000000059CC000-memory.dmp

                          Filesize

                          240KB

                        • memory/2712-177-0x0000000007E60000-0x0000000007E7E000-memory.dmp

                          Filesize

                          120KB

                        • memory/2712-186-0x0000000000400000-0x0000000000475000-memory.dmp

                          Filesize

                          468KB

                        • memory/2712-185-0x000000000051E000-0x0000000000555000-memory.dmp

                          Filesize

                          220KB

                        • memory/2916-183-0x0000000001630000-0x0000000001652000-memory.dmp

                          Filesize

                          136KB

                        • memory/2916-184-0x0000000001600000-0x0000000001627000-memory.dmp

                          Filesize

                          156KB

                        • memory/2916-203-0x0000000001630000-0x0000000001652000-memory.dmp

                          Filesize

                          136KB

                        • memory/3160-180-0x00000000009A0000-0x00000000009A6000-memory.dmp

                          Filesize

                          24KB

                        • memory/3160-181-0x0000000000990000-0x000000000099C000-memory.dmp

                          Filesize

                          48KB

                        • memory/3160-202-0x00000000009A0000-0x00000000009A6000-memory.dmp

                          Filesize

                          24KB

                        • memory/3784-189-0x00000000006C0000-0x00000000006C9000-memory.dmp

                          Filesize

                          36KB

                        • memory/3784-204-0x00000000006D0000-0x00000000006D5000-memory.dmp

                          Filesize

                          20KB

                        • memory/3784-188-0x00000000006D0000-0x00000000006D5000-memory.dmp

                          Filesize

                          20KB

                        • memory/3876-168-0x0000000000610000-0x0000000000617000-memory.dmp

                          Filesize

                          28KB

                        • memory/3876-170-0x0000000000600000-0x000000000060B000-memory.dmp

                          Filesize

                          44KB

                        • memory/3876-199-0x0000000000610000-0x0000000000617000-memory.dmp

                          Filesize

                          28KB

                        • memory/3956-194-0x0000000000F00000-0x0000000000F07000-memory.dmp

                          Filesize

                          28KB

                        • memory/3956-195-0x0000000000EF0000-0x0000000000EFD000-memory.dmp

                          Filesize

                          52KB

                        • memory/3956-206-0x0000000000F00000-0x0000000000F07000-memory.dmp

                          Filesize

                          28KB

                        • memory/4928-191-0x0000000000D10000-0x0000000000D16000-memory.dmp

                          Filesize

                          24KB

                        • memory/4928-192-0x0000000000D00000-0x0000000000D0B000-memory.dmp

                          Filesize

                          44KB

                        • memory/4928-205-0x0000000000D10000-0x0000000000D16000-memory.dmp

                          Filesize

                          24KB